{"id":"CVE-2018-11381","details":"The string_scan_range() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file.","modified":"2026-04-11T06:58:40.826025Z","published":"2018-05-22T19:29:00.520Z","references":[{"type":"ADVISORY","url":"https://github.com/radare/radare2/issues/9902"},{"type":"FIX","url":"https://github.com/radare/radare2/commit/3fcf41ed96ffa25b38029449520c8d0a198745f3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/radare/radare2","events":[{"introduced":"0"},{"last_affected":"c2b7d11ca74cd98eba8912d94ec0973cf2965697"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.5.0"}]}},{"type":"GIT","repo":"https://github.com/radareorg/radare2","events":[{"introduced":"0"},{"fixed":"3fcf41ed96ffa25b38029449520c8d0a198745f3"}]}],"versions":["0.10.0","0.10.1","0.10.2","0.10.3","0.10.4","0.10.4-termux4","0.10.5","0.10.6","0.8.6","0.8.8","0.9","0.9.2","0.9.4","0.9.6","0.9.7","0.9.8","0.9.8-rc1","0.9.8-rc2","0.9.8-rc3","0.9.8-rc4","0.9.9","1.0","1.0.0","1.0.1","1.0.2","1.1.0","1.2.0","1.2.0-git","1.3.0","1.3.0-git","1.4.0","1.5.0","1.6.0","2.0.0","2.0.1","2.1.0","2.2.0","2.4.0","2.5.0","radare2-windows-nightly","termux"],"database_specific":{"vanir_signatures":[{"digest":{"function_hash":"98494690071503454194797992045746234891","length":3308},"signature_version":"v1","source":"https://github.com/radareorg/radare2/commit/3fcf41ed96ffa25b38029449520c8d0a198745f3","target":{"function":"string_scan_range","file":"libr/bin/file.c"},"signature_type":"Function","id":"CVE-2018-11381-49ee0dbb","deprecated":false},{"digest":{"line_hashes":["21929376789596439544151635748175387463","135304949598820514148528422986955564816","90893773958739721628432767542698805236","167433008854843717354377112139355015952","131646173151381651989664268400677323778","75315884126951106224382910493167852627","110624375282005136507287153677307465291","75923100023603709790442625293417595952","128907132257500091596400469582241022120","190621870524681049041393540565297254899","64097654862288902144494563974971199337","122613457145837381517861684281175157753","254739571038874113869306874845254548663"],"threshold":0.9},"signature_version":"v1","source":"https://github.com/radareorg/radare2/commit/3fcf41ed96ffa25b38029449520c8d0a198745f3","target":{"file":"libr/bin/file.c"},"signature_type":"Line","id":"CVE-2018-11381-d4ac1eeb","deprecated":false}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-11381.json","vanir_signatures_modified":"2026-04-11T06:58:40Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}